Описание
The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 1:6.1p1-3 |
| esm-infra-legacy/trusty | not-affected | 1:6.1p1-3 |
| esm-infra/xenial | not-affected | 1:6.1p1-3 |
| hardy | ignored | end of life |
| lucid | ignored | end of life |
| oneiric | ignored | end of life |
| precise | ignored | |
| quantal | ignored | end of life |
| raring | not-affected | 1:6.1p1-3 |
| saucy | not-affected | 1:6.1p1-3 |
Показывать по
5 Medium
CVSS2
Связанные уязвимости
The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
The default configuration of OpenSSH through 6.1 enforces a fixed time ...
The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
5 Medium
CVSS2